Abstract
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for changes in the executable code as it is running and report modifications. The mechanism is built to be compatible with copy-specific static watermarking and other tamper-resistance techniques. The mechanism includes several innovations to make it stealthy and more robust.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
D. Aucsmith. Tamper resistant software: An implementation. In R. J. Anderson, editor, Information Hiding, Lecture Notes in Computer Science 1174, pages 317–333. Springer-Verlag, 1996.
H. Chang and M. Atallah. Protecting software by guards. This volume.
S. T. Chow, Y. Gu, H. J. Johnson, and V. A. Zakharov. An approach to the obfuscation of control-flow of sequential computer programs. In G. I. Davida and Y. Frankel, editors, ISC 2001, Lecture Notes in Computer Science 2200, pages 144–155. Springer-Verlag, 2001.
C. Collberg and C. Thomborson. Software watermarking: Models and dynamic embeddings. In Principles of Programming Languages, San Antonio, TX, pages 311–324, January 1999.
C. Collberg and C. Thomborson. Watermarking, tamper-proofing, obfuscation — Tools for software protection. Technical Report 2000-03, University of Arizona, February 2000.
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical Report 148, University of Auckland, 1997.
C. Collberg, C. Thomborson, and D. Low. Breaking abstractions and unstructuring data structures. In IEEE International Conference on Computer Languages, Chicago, IL, pages 28–38, May 1998.
C. Collberg, C. Thomborson, and D. Low. Manufacturing cheap, resilient and stealthy opaque constructs. In Principles of Programming Languages 1998, San Diego, CA, pages 184–196, January 1998.
R. Davidson and N. Myhrvold. Method and systems for generating and auditing a signature for a computer program, September 1996. US Patent 5,559,884. Assignee: Microsoft Corporation.
G. Morrisett, D. Walker, K. Crary, and N. Glew. From system F to typed assembly language. ACM Transactions on Programming Languages and Systems, 21(3):528–569, May 1999.
G. C. Necula. Compiling with proofs. PhD thesis, Carnegie Mellon University, September 1998.
G. C. Necula and P. Lee. Safe kernel extensions without run-time checking. In Proceedings of the Second Symposium on Operating Systems Design and Implementation, Seattle, WA, pages 229–243, October 1996.
J. R. Nickerson, S. T. Chow, and H. J. Johnson. Tamper resistant software: extending trust into a hostile environment. In Multimedia and Security Workshop at ACM Multimedia 2001, Ottawa, CA, October 2001.
T. Sander and C. Tschudin. Protecting mobile agents against malicious hosts. In Mobile Agents and Security, Lecture Notes in Computer Science 1419. Springer-Verlag, 1998.
C. Wang. A security architecture of survivable systems. PhD thesis, Department of Computer Science, University of Virginia, 2001.
C. Wang, J. Davidson, J. Hill, and J. Knight. Protection of software-based survivability mechanisms. In IEEE/IFIP International Conference on Dependable Systems and Networks, Goteborg, Sweden, July 2001.
C. Wang, J. Hill, J. Knight, and J. Davidson. Software tamper resistance: Obstructing the static analysis of programs. Technical Report CS-2000-12, Department of Computer Science, University of Virginia, 2000.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Horne, B., Matheson, L., Sheehan, C., Tarjan, R.E. (2002). Dynamic Self-Checking Techniques for Improved Tamper Resistance. In: Sander, T. (eds) Security and Privacy in Digital Rights Management. DRM 2001. Lecture Notes in Computer Science, vol 2320. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47870-1_9
Download citation
DOI: https://doi.org/10.1007/3-540-47870-1_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43677-5
Online ISBN: 978-3-540-47870-6
eBook Packages: Springer Book Archive